6
Social Engineering and Social Network Attacks
This chapter delves into the realm of social engineering, exploring its manifestations through mobile applications and social network attacks. It examines the various tactics employed by malicious actors to manipulate individuals and exploit their vulnerabilities. It further explores the growing threat of social engineering via social networks, shedding light on the techniques used to deceive users and compromise their personal information.
Additionally, the chapter delves into WhatsApp- and Instagram-based attacks that have gained widespread attention. This section shows how attackers leverage these social networks to execute a variety of social engineering attacks. Furthermore, the chapter delves ...
Get The Art of Social Engineering now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.